Login / Signup
An assessment of VoIP covert channel threats.
Takehiro Takahashi
Wenke Lee
Published in:
SecureComm (2007)
Keyphrases
</>
covert channel
security requirements
countermeasures
network architecture
quality of service
information security
knowledge discovery
case study
data processing
denial of service attacks